Thank you for purchasing CompuDav Hacker X-8.9!
This reference has been included to provide a jump start to
your new hacking career at Hacker X-8.9.
Introduction Screenshot

Introduction Legend
-
User Name Field - This is where you input
the user name of a pre-made account at Hacker X-8.9. If you do
not have an account yet, please click "Create New
Account", or see number four.
-
Password Field - This is where you input
the password of a pre-made account at Hacker X-8.9. If you do
not have an account yet, please click "Create New
Account", or see number four.
-
Login Button - Clicking this initiates
the login process to the Hacker X-8.9 main server and it also
starts the HX89 Control Panel. Logging in is done through tiny
CPU impulses which, in turn, create high-distance frequencies
that are picked up by the Hacker X-8.9 servers half-way around
the world.
-
Create New Account - Clicking this tab
brings up the screen below. Use this option if you're looking to
create a new Hacker X-8.9 account. See below for more
information.
Create New Account Screenshot

Create New Account Information
-
First Name Field - Your first name is
required for registration. Please provide it here.
-
User Name Field - Select a user name for
yourself and type it in here.
-
Password Field - Select a reasonably
secure password for yourself and enter it here.
-
Confirm Password Field - The text entered
in this field must be identical to the password entered in the
above field. Unequal passwords will trigger an error.
-
Sign Me Up! - Provided that everything
checks out, this will sign you up for a new account at Hacker
X-8.9.
Main Screen Screenshot 
Main
Screen Information
-
Hack Computer Button - Click this when
you are ready to begin your next hacking job. This will start
the hacking process as described in the screens below.
-
Upgrade Computer - Click this when you
need to upgrade your old hardware into something a little more
fancy (such as a triple G6 processor).
-
Take a Loan - If you're short of cash,
click this button to try to be approved for a loan. If you are
approved, you'll have to pay back that loan over roughly 10
missions. Disapproval will mean that you'll have to try to make
do with what you've got.
-
Purchase Software - If you need better
cracking tools, better DOS tools, or the infamous virus creation
software, this is where you'll go to stock up on them. When in
the software store, just click on the software's button on the
left, and click "add to cart" in order to add it to a
list of software to purchase. Clicking "remove from
cart" will remove it from your list of software for
purchase. When you're done, just click the "buy now"
button and your software will arrive instantaneously.
-
Write a Virus - Click this button to
initiate the virus creation process. Please be advised that you
must purchase the virus software beforehand, before you can use
this option.
-
E-Mail Viewer - Being a hacker requires
constant communication. This table will allow you to receive
your most recent mission.
-
Personal Data - This area displays your
personal statistics with Hacker X-8.9.
-
Computer Data - Similar in function to
the above area, this section displays the statistics of your
computer that you are using in the hacking world. Upgrades can
be made through the "upgrade computer" option,
described in number two.
Initial Hacking Interface Screenshot (size has
been reduced - click on picture for a full image) 
Initial
Hacking Interface Information
-
General Information - This area includes
the total time taken to hack the computer, the operating system
that the computer is using (very important when considering
deploying viruses), and it is also the area in which you'll be
notified when your mission is complete.
-
Percentage of Connection Traced - When
this bar reaches 100%, you have been traced and you will be
stripped of half of your money. Always keep an eye on this meter
- when it starts reaching full capacity, you'd better hurry up,
or get out of there!
-
Percentage of Hacking/DOS Attack Completed
- Although not depicted in the image, this is where you will be
able to see exactly what percentage of your current hack/DOS
attack is completed. Note that selecting a new cracking/DOS tool
will reset this to zero.
-
Selectable Cracking/DOS Tools - If you've
purchased any tools besides the brute force cracker, they will
be available here. Each cracking/DOS tool has some special
options, as described below:
-
Brute Force Cracker - Two options: Check
for characters - input characters in this box to give the
application a hint as to what characters might be in the
password. A correct character will lessen the hacking time,
but an incorrect one will increase it. Hacking method
change - changing the method will result in different
hacking/trace time ratios, try this if you're starting to feel
the hacking pressure.
-
Dictionary Cracker - One option:
Optimize for smaller/larger words - has a fifty-fifty
chance of increasing or decreasing the amount of time needed
to crack the password.
-
Stealth Cracker - No options available.
-
UltiCrack 4.95 - Two options: Stealth Settings - This option will addjust the cracking/tracing time ratios. Sometimes they adjust
in your favor, other times they don't. Predictive Password Completion - If this option is enabled, UltiCrack will use some predetermined algorithms to
attempt to find the password. Like the above option, sometimes the algorithms are correct, and sometimes they aren't.
-
Simple-attack - No adjustable
parameters available.
-
Final TKO - One option: Activate
"DifficultTrace" technology - enabling
this advanced technology can either increase or decrease the
amount of time needed for the remote connection to trace you.
Although this technology is very advanced, some servers have a
way of beating the system, hence the possibility for a
decrease in time needed to trace you.
-
Other Tools - These are additional tools
that you might need once you are inside the server. Clicking
"Destroy Computer" will destroy the remote machine,
but be warned that this is a permanent action, so make sure that
you do not have any other tasks (such as copying a file) to
complete. Selecting "add file" will permit you to add
a file to the server.
-
Server Information - This area displays
the IP address of the server as well as its message of the day.
-
Password Box/Login Button - The password
box is used to display either the password cracking process or
the cracked password itself, and is not user editable. When the
password has been cracked, the login button will become enabled.
Clicking this button will bring up the screen depicted below.
-
Instructions - A "shortened"
version of the necessary actions in order to complete the
missions is displayed here. To get the full lowdown on what
needs to happen, click on the "show actual e-mail"
button.
-
Copied Files View - This table lists all
files that have been copied to your computer. You can later open
these files by going to "Actions -> File Browser".
-
Questions - If the mission requires that
you answer questions, clicking this tab will display the
questions and their respective text boxes in which you can input
the answer. As soon as your answers match the correct ones, the
"incorrect" will change to "correct".
File Viewer Screenshot 
File
Viewer Information
-
Action Bar - This displays all the
actions available for each file. In order to execute one of
these actions, just select a file and click the respective
button. If this action is not needed, you may get a message
asking you whether or not you truly want to continue.
-
Logout - When the mission is complete,
this button will appear. Clicking it logs you out of the server
and commences the next mission.
-
File Table - This table lists all the
files that are located on the server. Clicking on a file will
select it and pressing delete/backspace while a file is selected
will delete it.
-
File Contents - This displays the
contents of the selected file.
|